Sender Receiver

Download Report

Transcript Sender Receiver

Integrated Services
and Differentiated
Services
Limitations of IP Architecture in
Supporting Resource Management
• IP provides only best effort service
• IP does not participate in resource management
– Cannot provide service guarantees on a per flow basis
– Cannot provide service differentiation among traffic
aggregates
• Early efforts
– Tenet group at Berkeley (Ferrari and Verma)
– ATM
• IETF efforts
– Integrated services initiative
– Differentiated services initiative
Integrated Services Internet
• Enhance IP’s service model
– Old model: single best-effort service class
– New model: multiple service classes, including
best-effort and QoS classes
• Create protocols and algorithms to support
new service models
– Old model: no resource management at IP level
– New model: explicit resource management at IP
level
• Key architecture difference
– Old model: stateless
– New model: per flow state maintained at routers
• used for admission control and scheduling
• set up by signaling protocol
Integrated Services Network
• Flow or session as
QoS abstractions
• Each flow has a
fixed or stable
path
• Routers along the
path maintain the
state of the flow
Integrated Services Example
• Achieve per-flow bandwidth and delay guarantees
– Example: guarantee 1MBps and < 100 ms delay to a flow
Receiver
Sender
Integrated Services Example
• Allocate resources - perform per-flow
admission control
Receiver
Sender
Integrated Services Example
• Install per-flow state
Receiver
Sender
Integrated Services Example
• Install per flow state
Receiver
Sender
Integrated Services
Example: Data Path
• Per-flow classification
Receiver
Sender
Integrated Services
Example: Data Path
• Per-flow buffer management
Receiver
Sender
Integrated Services Example
• Per-flow scheduling
Receiver
Sender
How Things Fit Together
RSVP
Admission
Control
Forwarding Table
Data In
Route Lookup
Per Flow QoS Table
Classifier
Scheduler
Control Plane
Routing
RSVP
messages
Data Plane
Routing
Messages
Data Out
Service Classes
• Multiple service classes
• Service can be viewed as a contract between
network and communication client
– end-to-end service
– other service scopes possible
• Three common services
– best-effort (“elastic” applications)
– hard real-time (“real-time” applications)
– soft real-time (“tolerant” applications)
Hard Real Time: Guaranteed
Services
• Service contract
– network to client: guarantee a deterministic upper
bound on delay for each packet in a session
– client to network: the session does not send more
than it specifies
• Algorithm support
– admission control based on worst-case analysis
– per flow classification/scheduling at routers
Soft Real Time: Controlled
Load Service
• Service contract:
– network to client: similar performance as
an unloaded best-effort network
– client to network: the session does not
send more than it specifies
• Algorithm Support
– admission control based on measurement of
aggregates
– scheduling for aggregate possible
Role of RSVP in the
Architecture
• Signaling protocol for establishing per flow
state
• Carry resource requests from hosts to
routers
• Collect needed information from routers to
hosts
• At each hop
– consults admission control and policy module
– sets up admission state or informs the requester
of the failure
RSVP Usage and Related
Issues
16
RSVP Design Features
•
•
•
•
•
IP Multicast centric design
Receiver initiated reservation
Different reservation styles
Soft state inside network
Decouple routing from reservation
IP Multicast
• Best-effort MxN delivery of IP datagrams
• Basic abstraction: IP multicast group
– identified by Class D address: 224.0.0.0 239.255.255.255
– sender needs only to know the group address, but
not the membership
– receiver joins/leaves group dynamically
• Routing and group membership managed
distributedly
– no single node knows the membership
– tough problem
– various solutions: DVMRP, CBT, PIM
RSVP Reservation Model
• Performs signaling to set up reservation
state for a session
• A session is a simplex data flow sent to
a unicast or a multicast address,
characterized by
– <IP dest, protocol number, port number>
• Multiple senders and receivers can be in
session
The Big Picture
Network
Sender
PATH Msg
Receiver
RSVP Usage and Related
Issues
20
The Big Picture (2)
Network
Sender
PATH Msg
Receiver
RESV Msg
RSVP Usage and Related
Issues
21
RSVP Basic Operations
• Sender sends PATH message via the data
delivery path
– set up the path state each router including the
address of previous hop
• Receiver sends RESV message on the
reverse path
– specifies the reservation style, QoS desired
– set up the reservation state at each router
• Things to notice
– receiver initiated reservation
– decouple the routing from reservation
– two types of state: path and reservation
Route Pinning
• Problem: asymmetric routes
– You may reserve resources on
RS3S5S4S1S, but data travels on
SS1S2S3R !
• Solution: use PATH to remember direct path
from S to R, I.e., perform route pinning
S2
R
S
S1
S3
IP routing
PATH
RESV
S4
S5
PATH and RESV messages
• PATH also specifies
– Source traffic characteristics
• use token bucket
– Reservation style – specify whether a RESV
message will be forwarded to this server
• RESV specifies
– Queueing delay and bandwidth requirements
– Source traffic characteristics (from PATH)
– Filter specification, i.e., what senders can use
reservation
– Based on these routers perform reservation
Token Bucket
• Characterized by two parameters (r, b)
– r – average rate
– b – token depth
• Assume flow arrival rate <= R bps (e.g., R link capacity)
• A bit is transmitted only when there is an available token
• Arrival curve – maximum amount of bits transmitted by time t
r bps
Arrival curve
bits
slope r
b bits
b
slope R
<= R bps
time
regulator
End-to-End Reservation
• When R gets PATH message it knows
– Traffic characteristics (tspec): (r,b,R)
– Number of hops
• R sends back this information + worst-case delay in RESV
• Each router along path provide a per-hop delay guarantee
and forward RESV with updated info
– In simplest case routers split the delay
num hops
S
(b,r,R)
(b,r,R,0,0)
PATH
RESV
S1
S2
(b,r,R,2,D-d1)
(b,r,R,1,D-d1-d2)
(b,r,R,3)
S3
R
(b,r,R,3,D)
worst-case delay
Per-hop Reservation
• Given (b,r,R) and per-hop delay d
• Allocate bandwidth ra and buffer space
Ba such that to guarantee d
slope ra
bits
slope r
Arrival curve
b
d
Ba
Reservation Style
• Motivation: achieve more efficient resource
utilization in multicast (M x N)
• Observation: in a video conferencing when
there are M senders, only a few can be active
simultaneously
– multiple senders can share the same reservation
• Various reservation styles specify different
rules for sharing among senders
Reservation Styles and Filter Spec
• Reservation style
– use filter to specify which sender can use the
reservation
• Three styles
– wildcard filter: does not specify any sender; all
packets associated to a destination shares same
resources
• Group in which there are a small number of simultaneously
active senders
– fixed filter: no sharing among senders, sender
explicitly identified for the reservation
• Sources cannot be modified over time
– dynamic filter: resource shared by senders that are
(explicitly) specified
• Sources can be modified over time
Wildcard Filter Example
• Receivers: H1, H2; senders: H3, H4, H5
• Each sender sends B
• H1 reserves B; listen from one server at a
time
(B,*)
H2
S1
S2
(B,*)
(B,*)
H1
S3
(B,*)
(B,*)
H5
receiver
H3
sender
(B,*)
H4
Wildcard Filter Example
• H2 reserves B
H2
(B,*)
(B,*)
S1
S2
(B,*)
(B,*)
H1
S3
(B,*)
(B,*)
H5
receiver
H3
sender
(B,*)
H4
Wildcard Filter
• Advantages
– Minimal state at routers
• Routers need to maintain only routing state
augmented by reserved bandwidth on outgoing links
• Disadvantages
– May result in inefficient resource utilization
Wildcard Filter: Inefficient
Resource Utilization Example
• H1 reserves 3B; wants to listen from all
senders simultaneously
• Problem: reserve 3B on (S3:S2)
although 2B sufficient !
H3
H2
S1
S2
(3B,*)
S3
(3B,*)
(3B,*)
H1
H4
H5
receiver
sender
Fixed Filter Example
• Receivers: H2, H3, H4, H4; Sender: H1, H4, H5
• Routers maintain state for each receiver in the
routing table
NextHop Sources
H1
S2(H5, H4)
H2
H1(H1), S2(H5, H4)
H3
H2
S1
S2
S3
H4
H1
H5
receiver
sender
sender+receiver
Fixed Filter Example
• H2 wants to receive B only from
H4
H2
H3
(B,H4)
S1
S2
S3
(B,H4)
(B,H4)
(B,H4)
H1
H5
receiver
sender
sender+receiver
H4
Dynamic Filter Example
• H5 wants to receive 2B from any
source
H2
H3
(B,H4)
(B,*)
S1
S2
(B,H4)
(2B,*)
(B,H4)
H1
S3
(B,*)
(B,H4)
H5
receiver
sender
sender+receiver
H4
Tire-down Example
• H4 leaves the group
– H4 no longer sends PATH message
– State corresponding to H4 removed
H2
H3
(B,H4)
(B,*)
S1
S2
(B,H4)
(2B,*)
(B,H4)
H1
S3
(B,*)
(B,H4)
H5
receiver
sender
sender+receiver
H4
Tire-down Example
• H4 leaves the group
– H4 no longer sends PATH message
– State corresponding to H4 removed
H3
H2
(B,*)
S1
H1
S2
S3
(2B,*)
(B,*)
H5
receiver
sender
sender+receiver
Fixed Filter Example
• Receivers: H2, H3, H4, H4;
Sender: H1
H2
(*,B)
(*,B)
S1
S2
(*,B)
(*,B)
H1
S3
(*,B)
(*,B)
H5
receiver
H3
sender
(*,B)
H4
Soft State
• Per session state has a timer associated with it
– path state, reservation state
• State lost when timer expires
• Sender/Receiver periodically refreshes the
state, resends PATH/RESV messages, resets
timer
• Claimed advantages
– no need to clean up dangling state after failure
– can tolerate lost signaling packets
• signaling message need not be reliably transmitted
– easy to adapt to route changes
• State can be explicitly deleted by a Teardown
message
RSVP and Routing
• RSVP designed to work with variety of
routing protocols
• Minimal routing service
– RSVP asks routing how to route a PATH message
• Route pinning
– addresses QoS changes due to “avoidable” route
changes while session in progress
• QoS routing
– RSVP route selection based on QoS parameters
– granularity of reservation and routing may differ
• Explicit routing
– Use RSVP to set up routes for reserved traffic
Recap of RSVP
• PATH message
–
–
–
–
sender template and traffic spec
advertisement
mark route for RESV message
follow data path
• RESV message
– reservation request, including flow and filter spec
– reservation style and merging rules
– follow reverse data path
• Other messages
– PathTear, ResvTear, PathErr, ResvErr
Question
• What do you think about the design
decision to make RSVP IP multicast
centric?
What is still Missing?
•
•
•
•
Classification algorithm
Scheduling algorithm
Admission control algorithm
QoS Routing algorithm
Differentiated
Services
What is the Problem?
• Goal: provide support for wide variety of
applications:
– Interactive TV, IP telephony, on-line gamming
(distributed simulations), VPNs, etc
• Problem:
– Best-effort cannot do it (see previous
lecture)
– Intserv can support all these applications, but
• Too complex
• Not scalable
Differentiated Services
(Diffserv)
• Build around the concept of domain
• Domain – a contiguous region of network under
the same administrative ownership
• Differentiate between edge and core routers
• Edge routers
– Perform per aggregate shaping or policing
– Mark packets with a small number of bits; each bit
encoding represents a class (subclass)
• Core routers
– Process packets based on packet marking
• Far more scalable than Intserv, but provides
weaker services
Diffserv Architecture
• Ingress routers
– Police/shape traffic
– Set Differentiated Service Code Point (DSCP) in
Diffserv (DS) field
• Core routers
– Implement Per Hop Behavior (PHB) for each DSCP
– Process packets based on DSCP
DS-2
DS-1
Ingress
Ingress
Egress
Edge router
Core router
Egress
Differentiated Service (DS)
Field
0
5 6 7
DS Filed
0
4
Version HLen
8
16
TOS
Identification
TTL
19
31
Length
Flags
Fragment offset
Protocol
Header checksum
Source address
Destination address
IP
header
Data
• DS filed reuse the first 6 bits from the
former Type of Service (TOS) byte
• The other two bits are proposed to be
used by ECN
Differentiated Services
• Two types of service
– Assured service
– Premium service
• Plus, best-effort service
Assured Service
[Clark & Wroclawski ‘97]
• Defined in terms of user profile, how
much assured traffic is a user allowed to
inject into the network
• Network: provides a lower loss rate than
best-effort
– In case of congestion best-effort packets
are dropped first
• User: sends no more assured traffic than
its profile
– If it sends more, the excess traffic is
converted to best-effort
Assured Service
• Large spatial granularity service
• Theoretically, user profile is defined irrespective of
destination
– All other services we learnt are end-to-end, i.e., we know
destination(s) apriori
• This makes service very useful, but hard to provision (why
?)
Traffic profile
Ingress
Premium Service
[Jacobson ’97]
• Provides the abstraction of a virtual pipe
between an ingress and an egress router
• Network: guarantees that premium packets
are not dropped and they experience low
delay
• User: does not send more than the size of the
pipe
– If it sends more, excess traffic is delayed, and
dropped when buffer overflows
Edge Router
Ingress
Traffic conditioner
Class 1
Marked traffic
Traffic conditioner
Data traffic
Per aggregate
Classification
(e.g., user)
Class 2
Classifier
Best-effort
Scheduler
Assumptions
• Assume two bits
– P-bit denotes premium traffic
– A-bit denotes assured traffic
• Traffic conditioner (TC) implement
– Metering
– Marking
– Shaping
TC Performing Metering/Marking
• Used to implement Assured Service
• In-profile traffic is marked:
– A-bit is set in every packet
• Out-of-profile (excess) traffic is unmarked
– A-bit is cleared (if it was previously set) in every packet;
this traffic treated as best-effort
r bps
User profile
b bits (token bucket)
assured traffic
Metering
Set A-bit
in-profile traffic
Clear A-bit
out-of-profile traffic
TC Performing
Metering/Marking/Shaping
• Used to implement Premium Service
• In-profile traffic marked:
– Set P-bit in each packet
• Out-of-profile traffic is delayed, and when buffer
overflows it is dropped
r bps
User profile
b bits (token bucket)
premium traffic
Metering/
Shaper/
Set P-bit
out-of-profile traffic
(delayed and dropped)
in-profile traffic
Scheduler
• Employed by both edge and core routers
• For premium service – use strict priority, or
weighted fair queuing (WFQ)
• For assured service – use RIO (RED with In and
Out)
– Always drop OUT packets first
• For OUT measure entire queue
• For IN measure only in-profile queue
Dropping
probability
1
OUT
IN
Average queue length
Scheduler Example
• Premium traffic sent at high priority
• Assured and best-effort traffic pass
through RIO and then sent at low
priority
P-bit set?
yes
high priority
no
yes
A-bit set? no
RIO
low priority
Control Path
• Each domain is assigned a Bandwidth Broker
(BB)
– Usually, used to perform ingress-egress bandwidth
allocation
• BB is responsible to perform admission
control in the entire domain
• BB not easy to implement
– Require complete knowledge about domain
– Single point of failure, may be performance
bottleneck
– Designing BB still a research problem
Example
• Achieve end-to-end bandwidth guarantee
3
2
BB
1 9
8 profile
sender
7
BB
6
profile
5
BB
4 profile
receiver
Comparison to Best-Effort
and Intserv
Best-Effort Diffserv
Intserv
Service
Connectivity
No isolation
No
guarantees
Per aggregate
isolation
Per aggregate
guarantee
Per flow
isolation
Per flow
guarantee
Service
scope
End-to-end
Domain
End-to-end
Complexity
No setup
Long term setup
Per flow steup
Scalability
Highly
scalable
(nodes
maintain
only routing
state)
Scalable
(edge routers
maintains per
aggregate state;
core routers per
class state)
Not scalable
(each router
maintains per
flow state)
Summary
• Diffserv more scalable than Intserv
– Edge routers maintain per aggregate state
– Core routers maintain state only for a few traffic
classes
• But, provides weaker services than Intserv,
e.g.,
– Per aggregate bandwidth guarantees (premium
service) vs. per flow bandwidth and delay
guarantees
• BB is not an entirely solved problem
– Single point of failure
– Handle only long term reservations (hours, days)